Presentation is loading. Please wait.

Presentation is loading. Please wait.

Societal Issues in Computing (COMP466)

Similar presentations


Presentation on theme: "Societal Issues in Computing (COMP466)"— Presentation transcript:

1 Societal Issues in Computing (COMP466)
Chapter 2 COMPUTER MISUSE (ABUSE) AND CRIME Prepared by: Qasem Obeidat

2 Introduction This chapter is primarily concerned with the main criminal offences which can be committed using a computer. Some of these, such as Fraud, Hacking or Virus writing.

3 Computer crime and abuse
Computer crime: Commission of illegal acts through use of compute or against a computer system – computer may be object or instrument of crime Computer abuse: Commission of acts involving a computer that may not be illegal but are considered unethical, i.e. spamming

4 What is the Computer Misuse Act of 1990?
The Computer Misuse Act of 1990 is a law in the UK that makes illegal certain activities, such as hacking into other people’s systems, misusing software, or helping a person to gain access to protected files of someone else's computer.

5 What is the Computer Misuse Act of 1990?(cont.)
The Computer Misuse Act is split into three sections and makes the following acts illegal: Unauthorized Access to Computer Material Unauthorized Access to Computer systems with intent to commit another offense Unauthorized Modification of Computer Material

6 Unauthorized Access to Computer Material
The first section in the Computer Misuse Act: Forbids a person to use someone else’s identification to access a computer, run a program or obtain any data, even if no personal gain is involved in such access. You also cannot change, copy, delete or move a program. Outlaws any attempts to obtain someone else’s password. Obviously, if someone gives you their identification and you may legally use the computer, these laws under Unauthorized Access do not apply.

7 2. Unauthorized Access to Computer systems with intent to commit another offense
The second section in the Computer Misuse Act: Is gaining access to a computer system in order to commit or facilitate a crime. You can’t use someone else’s system to send material that might be offensive or to start worms or viruses. You also can’t give someone your identification so they can use your system for this purpose

8 Unauthorized Modification of Computer Material
The third section in the Computer Misuse Act: you can’t delete, change or corrupt data. Again, if you put a virus into someone else’s system you would be violating the act. Usually committing Unauthorized Access only is thought a crime punishable by fine. Access with Intent, and Unauthorized Modification are considered more severe and may be punished by heavy fines and/or jail time.

9 Signs of Employee Technology Abuse
Frequent computer crashes Frequent PC slowness Frequent Virus Infestations Employee turns monitor off or clicks quickly when others enter their work area Unique increase in SPAM Installation of non-office software applications Change in mood/workplace relationships Decrease in productivity Increase on Internet access

10 Computer Fraud What is Computer Fraud?
The U.S. Department of Justice defines computer fraud as any illegal act for which knowledge of computer technology is essential for its: Perpetration; Investigation; Prosecution.

11 Computer Fraud (Cont.) What is Computer Fraud? The definition of what constitutes computer fraud becomes ever more complex with the ingenuity of people who intend to deceive, misrepresent, destroy, steal information, or cause harm to others by accessing information through deceptive and illegal means.

12 Approaches to Computer Fraud
Computer fraud includes the following: Unauthorized theft, use, access, modification, copying, and destruction of software or data. Theft or destruction of computer hardware. Use or the conspiracy to use computer resources to commit a felony. Theft of money by altering computer records.

13 Challenges Faced Computer frauds cost billions of dollars each year, and their frequency is increasing because: Not everyone agrees on what constitutes computer fraud. Many networks have a low level of security. Instructions on how to perpetrate computer crimes and abuses are readily available on the Internet.

14 Computer Fraud Classification
Frauds can be categorized as: Input Processor Computer instructions Stored data

15 Input Fraud The simplest and most common way to commit a fraud is to alter computer input. Requires little computer skills. Perpetrators only need to understand how the system operates

16 2. Processor Fraud Involves computer fraud committed through unauthorized system use. Incidents could involve employees: Surfing the Internet; Using the company computer to conduct personal business; or Using the company computer to conduct a competing business.

17 3. Computer Instructions Fraud
Involves tampering with the software that processes company data. May include: Modifying the software Making illegal copies

18 4. Data Fraud Involves: Altering or damaging a company’s data files; or Copying, using, or searching the data files without authorization. Theft of data often occurs so that perpetrators can sell the data.

19 Computer Abuse Techniques
Perpetrators have devised many methods to commit computer fraud and abuse. These include: Data diddling Changing data before, during, or after it is entered into the system. Can involve adding, deleting, or altering key system data. Data Leakage Unauthorized copying of company data.

20 Computer Abuse Techniques (cont.)
Denial of Service attacks An attacker overloads and shuts down an ISP’s system by sending bombs at a rate of thousands per second—often from randomly generated addresses. Threats A threatening message is sent to a victim to induce the victim to do something that would make it possible to be defrauded.

21 Computer Abuse Techniques (cont.)
Hacking Unauthorized access to and use of computer systems—usually by means of a personal computer and a telecommunications network. Most hackers break into systems using known flaws in operating systems, applications programs, or access controls. - The term hacker has a double meaning within the field of computing. A hacker can be an expert computer programmer who creates complex software and hardware. These hackers are experts in the field of computing and have achieved a certain elite status within their field. The other commonly known meaning of the word is someone who breaks into computer security networks for his own purpose.

22 Computer Abuse Techniques (cont.)
Phreaking Hacking that attacks phone systems and uses phone lines to transmit viruses and to access, steal, and destroy data. They also steal telephone services and may break into voice mail systems. Some hackers gain access to systems through dial-up modem lines.

23 Computer Abuse Techniques (cont.)
Packet Sniffers Programs that capture data from information packets as they travel over the Internet or company networks. Password Cracking An intruder penetrates a system’s defenses, steals the file of valid passwords, decrypts them, and then uses them to gain access to almost any system resources.

24 Computer Abuse Techniques (cont.)
Phishing (Hoax) Sending out a spoofed that appears to come from a legitimate company, such as a financial institution. EBay, PayPal, and banks are commonly spoofed. The recipient is advised that information or a security check is needed on his account, and advised to click on a link to the company’s website to provide the information. The link connects the individual to a website that is an imitation of the spoofed company’s actual website. These counterfeit websites appear very authentic, as do the s.

25 Computer Abuse Techniques (cont.)
A virus is a software program designed to damage computer files – Trojan horse: virus that disguises itself as a useful program – Worm: a file that works its way through a computer system causing damage

26 Detecting and Preventing Computer Abuse
Organizations must take every precaution to protect their information systems. Certain measures can significantly decrease the potential for fraud and any resulting losses. These measures include: Make fraud less likely to occur Increase the difficulty of committing fraud Improve detection methods Reduce fraud losses

27 Detecting and Preventing Computer Abuse (cont.)
The most important thing is that, all computer users must believe in security issues and have a high attitude to be aware of falling in the traps of the perpetrators.

28 How To Protect Your Computer
Install and regularly update antivirus software: – Designed to search for viruses and repair destroyed files 2. Install a firewall: – Prevents users from visiting inappropriate websites and unauthorized users from gaining access to a computer or network 3. Use passwords: – Change regularly 4. Purchase copyrighted software: – Copyrighted software: provides a legal right to the copyright holder or author of the software – Software Piracy: Illegally copying software programs, movies, or music files


Download ppt "Societal Issues in Computing (COMP466)"

Similar presentations


Ads by Google